Red Hat Bugzilla – Bug 192636
CVE-2006-1858 SCTP chunk length overflow
Last modified: 2009-03-09 07:46:47 EDT
When performing bound checks during the parameter processing, we want to use the real chunk and paramter lengths for bounds instead of the rounded ones. This prevents us from potentially walking of the end if the chunk length was miscalculated. The upstream fix can be found here: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dd2d1c6f2958d027e4591ca5d2a04dfe36ca6512
verifying the backport now
Created attachment 130246 [details] backport of the referenced patch Backport of the referenced patch. I'll post as soon as the U5 tree opens up.
committed in stream E5 build 42.0.1. A test kernel with this patch is available from http://people.redhat.com/~jbaron/rhel4/
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0617.html
committed in stream U5 build 42.4. A test kernel with this patch is available from http://people.redhat.com/~jbaron/rhel4/